Lecture 7 Flashcards

Malicious code

1
Q

A threat that exploits various vulnerability to spread malicious payloads is called what?

A

Malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

People who are extremely skilled software developers and develop maliciuos code are called what?

A. Skilled malicious code programmers
B. Script kiddies

A

A. Skilled malicious code programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A person that uses existing and well known techniques and programs or scripts are called what?

A. Skilled malicious code programmers
B. Script kiddies

A

B. Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Macro virus uses what?

A

script functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This virus is stored is stored in the MBR and another location in the system.

A

master boot record (MBR) virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This virus type infects executable files and triggers when the OS tries to execute them.

A

File infector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are there fewer UNIX viruses?

A

they are developed on entirely different kernels make it difficult to write a virus that would impact a large number of UNIX systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Signature based antivirus works how?

A

Use a database of known signatures to find a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A virus that uses more than 1 propagation technique is called what?

A. Stealth
B. Multipart
C. Hidden
D. Rootkit

A

B. Multipart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of virus hides by tampering with the OS?

A. Stealth
B. Multipart
C. Hidden
D. Polymorphic

A

A. Stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This virus modifies its code as it moves from system to system.

A. Stealth
B. Multipart
C. Polymorphic
D. Rootkit

A

C. Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This virus encrypts their code with different cryptographic keys to avoid detection.

A. Stealth
B. Encrypted
C. Polymorphic
D. Rootkit

A

B. Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a logic bomb virus?

A

It lies dormant until a specific trigger is met..Can be time or a particular action being performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What time of virus looks benign but is really malicious?

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a worm?

A

Malicious code that can self propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The code red worm did 3 things. What were they?

A

Look for vulnerable versions of IIS
Defaced html pages on the local web server
planted a logic bomb

17
Q

This worm searched for a Siemans controller to disrupt nuclear facilities by destroying the centrifuge.

A

Stuxnet

18
Q

This type of malicious code monitors your actions and collects information and transmits it back to a remote system.

A

Spyware

19
Q

What are the three key places to implement countermeasures of malicious code?

A

Clients
Servers
Content filters (ex: email)

20
Q

This type of DDos compromised third party systems to install a program and lies dormant waiting for instruction.

A. Syn Flood
B. Trinoo and Tribe Flood Network
C. Smurf
D. Teardrop

A

B. Trinoo and Tribe Flood Network

21
Q

This attack uses one or more third party newtorks to conduct an attack.

A. Syn Flood
B. Trinoo and Tribe Flood Network
C. Smurf
D. Teardrop

A

C. Smurf (distributed reflective denial-of-service attack) (DRDos)

22
Q

A DNS amplification attack is used to what?

A

Send a large volume of unwanted traffic to a third party.

23
Q

this type of attack is where a fragmented packet is sent that does not conform to the fragmentation protocol specification. The system doesn’t know how to handle this and can crash.

A

Teardrop

24
Q

This type of attack occurs when an artificial TCP segmnt has the SYN flag set and the source and destination IP are set to the victim machine.

A

Land attack

25
Q

An attack where a ping packet is sent with a size over the alloted size (65,536).

A

Ping of Death

26
Q

When a developer does not properly program input validation this attack can occur.

A

buffer overflow

27
Q

When a program checks the access permission too far in advance of a resource use this issue can occur.

A. buffer overflow
B. Land attack
C. TOC/TOU
D. teardrop

A

C. TOC/TOU

28
Q

An undocumted access mechanism to bypass normal access restrictions. Developers may use them.

A

trapdoor/backdoor

29
Q

These are used to allow attackers to gain expanded access to a system.

A

Rootkit

30
Q

this type of attack on web applications injects client-side scripts into webpages.

A. SQL injection
B. Cross-site Scripting (XSS)

A

B. Cross-site Scripting (XSS)

31
Q

This occurs when an attacker inserts their own SQL code into the input field to affect the underlying database.

A. SQL injection
B. Cross-site Scripting (XSS)

A

A. SQL injection

32
Q

A reconnaissance attack that tries to gather IP information about an organization. Can use ping sweep.

A. Port Scan
B. Vulnerability scan
C. Ip Probe
D. Dumpster Diving

A

C. Ip Probe

33
Q

Performing a scan to find open or used ports in an environment.

A. Port Scan
B. Vulnerability scan
C. Ip Probe
D. Dumpster Diving

A

A. Port Scan

34
Q

A tool to find specific vulnerabilities on a potential target system.

A. Port Scan
B. Vulnerability scan
C. Ip Probe
D. Dumpster Diving

A

B. Vulnerability scan

35
Q

This attack analyzes waste to gain intelligence that might help launch an attack.

A. Port Scan
B. Vulnerability scan
C. Ip Probe
D. Dumpster Diving

A

D. Dumpster Diving